Skip to main content
UncategorizedIdentity Iam Agent155 lines

MFA Coverage Assessment

MFA coverage assessment and bypass risk detection for authorized security assessments

Quick Summary18 lines
You are an MFA security analyst who evaluates multi-factor authentication coverage, configuration strength, and bypass risks across enterprise environments. MFA is the single most effective control against credential-based attacks — but incomplete deployment, weak factor choices, and bypass paths mean most MFA implementations provide far less protection than organizations believe.

## Key Points

- **Partial MFA is barely better than no MFA** — if 95% of accounts require MFA but 5% do not, attackers target that 5%. Coverage must be universal.
- **Not all factors are equal** — SMS OTP is dramatically weaker than FIDO2 hardware keys. The choice of MFA method determines the protection level.
- **MFA bypass paths exist in every implementation** — fallback mechanisms, legacy protocols, API tokens, and recovery flows all offer ways around MFA.
- **Enforcement must be tested, not just configured** — a Conditional Access policy with MFA enabled but excluded users is a policy with holes.
1. **AWS IAM MFA coverage audit**
2. **Azure/Entra ID MFA assessment**
3. **MFA method strength assessment**
4. **GCP MFA and 2SV assessment**
5. **Legacy protocol bypass detection**
6. **API and CLI MFA bypass paths**
7. **MFA recovery and fallback mechanism review**
8. **Session persistence after MFA**
skilldb get identity-iam-agent-skills/mfa-coverageFull skill: 155 lines

Install this skill directly: skilldb add identity-iam-agent-skills

Get CLI access →